Verified Test Bank – Ch.8 – Terrorism And Evolving Security - Exam Pack | International Relations 3e Shiraev by Eric Shiraev. DOCX document preview.

Verified Test Bank – Ch.8 – Terrorism And Evolving Security

CHAPTER 8: TERRORISM AND EVOLVING SECURITY CHALLENGES

Test Questions

Multiple-Choice Questions

Question type: factual

Section 8.1 Terrorism and Counterterrorism

1.Of the following terrorist groups, which orchestrated the 9/11 attacks?

  1. ISIS.
  2. Al-Qaeda.
  3. Taliban.
  4. Hamas.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

2. International terrorism rejects ______ and defies _______.

  1. International law . . . international organizations.
  2. Domestic law . . . domestic institutions.
  3. Sharia law . . . the Koran.
  4. Sharia law . . . international organizations.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

3. States and international organizations develop long-term policies and specific short-term measures about terrorism that BEST are called

  1. Guerrilla warfare.
  2. Fight Terror campaign.
  3. Geostrategy.
  4. Counterterrorism.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

4. Which country did the United States invade after the 9/11 terrorist attacks?

  1. Iraq.
  2. Afghanistan.
  3. Saudi Arabia.
  4. Libya.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

5. According to international law, individuals suspected of terrorist acts are subject to _____, or removal from one country to another to face charges.

  1. Extradition.
  2. Extraordinary rendition.
  3. Immunity.
  4. Command and control.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

6. The 1972 Munich Olympics terrorist incident could BEST be referred to as

  1. State terror.
  2. International terrorism.
  3. Domestic terrorism.
  4. Guerilla warfare.

Question type: factual

Section 8.1 Terrorism and Counterterrorism

7. What terrorist group attacked the 1972 Olympic Games in Munich?

  1. Global jihad.
  2. ISIS.
  3. IRA.
  4. Palestinian militants.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

8. Which of the following statements is NOT true?

  1. Future terrorist attacks may involve weapons of mass destruction.
  2. Terrorist groups use political violence or threats of violence to influence governments or key decision makers.
  3. Terrorist groups are often relatively easy to infiltrate.
  4. Terrorists understand that they cannot defeat states and international coalitions in an open battle.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

9. Terrorists largely rely on ____ to compel others to comply with demands.

  1. Coercion and extortion.
  2. Persuasion and force.
  3. Ultimatums and reparations.
  4. Conversion and logic.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

10. The logic of terrorism is characterized by all of the following, EXCEPT

  1. The argument for collective responsibility.
  2. The justified act of retaliation.
  3. The method of last resort.
  4. The self-fulfilling prophecy.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

11. A caliphate is led by a ________ ruler.

a. Hereditary.

b. Socialist.

c. Anarchist.

d. Muslim.

Question type: factual

Section 8.1 Terrorism and Counterterrorism

12. Which group sought to create an Islamic state in Iraq and Syria?

a. Al-Qaeda.

b. Red Army Faction.

c. ISIS.

d. Palestinian Liberation Organization.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

13. One of the groups below is NOT considered a terrorist group of the earlier waves.

  1. Al-Qaeda.
  2. Red Army Faction.
  3. PKK.
  4. Shining Path.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

14. Which of the groups below are NOT religion based?

  1. Shining Path.
  2. Al-Qaeda.
  3. Hamas.
  4. Hezbollah.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

15. Which of the following groups has NOT been defeated or largely subdued?

  1. IRA.
  2. RAF.
  3. Red Brigades.
  4. Hamas.

Question type: factual

Section 8.1 Terrorism and Counterterrorism

16. ______ is a Shiite group operating from Lebanon that targets Israel and its supporters.

  1. Hezbollah.
  2. Hamas.
  3. Al-Qaeda.
  4. RAF.

Question type: applied

Section 8.1 Terrorism and Counterterrorism

17. The United States government is likely overall MOST concerned with cyberattacks from which of the following countries?

a. China and Russia.

b. South Korea and Japan.

c. Great Britain and France.

d. Mexico and Brazil.

Question type: conceptual

Section 8.1 Terrorism and Counterterrorism

18. In 2009, Great Britain’s Joint Intelligence Committee warned that phone components built in this country could disrupt Britain’s power and food supplies:

a. Russia.

b. South Korea.

c. The United States.

d. China.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

19. According to realism, in 1914 the Austrian government in Vienna _____ action to punish the Serbs.

  1. Should have taken swift.
  2. Should have taken no.
  3. Should have waited before taking.
  4. Should have avoided any.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

20. By disrupting the ________ or posing asymmetrical threats, terrorism brings _____, which leads to international tensions.

  1. Power balance . . . instability.
  2. Power games . . . chaos.
  3. Structural balance . . . confidence.
  4. Status quo . . . stability.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

21. The 1914 Sarajevo assassination caused

  1. A shift in the global power balance caused by nonstate actors.
  2. A solidifying in global power structures that helped Austria and Germany mobilize.
  3. A traumatic power shift orchestrated by the Serbian state.
  4. A chain reaction that led Russia to invade Germany.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

22. Realist strategies of counterterrorism do NOT include

  1. Monitoring.
  2. Prevention.
  3. Preemption.
  4. Education.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

23. According to the liberal perspective, actions against terrorist groups

  1. Should be conducted in secret.
  2. Should be strictly legitimate.
  3. Should be conducted only in the terrorists’ home country.
  4. Should be put to a vote of the people before they are carried out.


Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

24. In the view of liberalists, illegal violent actions should not cause illegal counteractions, a view termed

  1. The criminalization of terrorism.
  2. The decriminalization of terrorism.
  3. The terrorist paradigm.
  4. The terrorist law.

Question type: conceptual

Section 8.2 Traditional Views of Evolving Security Threats

25. Which of the following statements about liberalism is NOT true?

  1. States should be free to use surveillance and prevention to combat terrorism.
  2. Terrorism is a complex social and political phenomenon with interrelated causes.
  3. People turn to terrorism for a reason, even if it appears to be a distorted one.
  4. Terrorists recruit their support by exploiting acute social and political problems.

Question type: applied

Section 8.3 Alternative Views of Evolving Security Threats

26. As applied to explaining the causes of terrorism, constructivism has the most in common with

  1. Liberalism.
  2. Realism.
  3. Neorealism.
  4. Marxism.

Question type: factual

Section 8.3 Alternative Views of Evolving Security Threats

27. Constructivists argue that there are three fundamental pillars on which terrorism is built; this is NOT one of them:

  1. Terrorists generally believe that some profound injustice has occurred.
  2. Terrorists see their targets as solely responsible for this injustice.
  3. Terrorists believe that Islam should prevail and stop global injustice.
  4. Terrorists believe that only violence can direct attention to the injustice.

Question type: factual

Section 8.3 Alternative Views of Evolving Security Threats

28. The conflict in Northern Ireland was essentially a conflict between

  1. Rich and poor.
  2. The Irish and the English.
  3. Protestants and Catholics.
  4. Socialists and capitalists.

Question type: applied

Section 8.3 Alternative Views of Evolving Security Threats

29. The Basque separatist movement demands its independence from which country?

  1. Italy.
  2. Spain.
  3. Portugal.
  4. Greece.

Question type: applied

Section 8.3 Alternative Views of Evolving Security Threats

30. The abbreviation ETA stands for which movement?

  1. Irish separatist movement.
  2. Greek separatist movement.
  3. Basque separatist movement.
  4. French separatist movement.

Question type: applied

Section 8.3 Alternative Views of Evolving Security Threats

31. Why did terrorism NOT take root in Japan and Germany under Allied occupation following World War II?

  1. Potential terrorists had no access to bomb-making materials.
  2. The United States imposed draconian military law.
  3. Potential terrorists had difficulty communicating with each other.
  4. Defeat in war ended nearly all support for extreme nationalism.

Question type: factual

Section 8.3 Alternative Views of Evolving Security Threats

32. Which country has been primarily responsible for funding Wahhabism and Salafism, two radical forms of Islam?

  1. Saudi Arabia.
  2. Iran.
  3. Iraq.
  4. Egypt.

Question type: factual

Section 8.3 Alternative Views of Evolving Security Threats

33. Wars in these two countries were important recruiting tools for Islamic fundamentalist terrorists:

  1. Spain and Argentina.
  2. Turkey and Russia.
  3. Vietnam and Korea.
  4. Iraq and Afghanistan.

Question type: factual

Section 8.4 Context and Applications

34. Research has shown that although extreme violence such as suicide attacks seems ____, terrorists believe that they act with complete ____.

  1. Irrational . . . rationality.
  2. Rational . . . irrationality.
  3. Somewhat rational . . . indifference.
  4. Less irrational . . . compassion.

Question type: factual

Section 8.4 Context and Applications

35. Which of the following statements about terrorists is TRUE?

  1. They tend to be younger.
  2. They are about evenly divided between males and females.
  3. They often show strong signs of mental illness.
  4. They often have high levels of self-esteem.

Question type: factual

Section 8.4 Context and Applications

36. From a psychological perspective, terrorists usually

  1. Have high levels of self-esteem.
  2. Have low levels of anger.
  3. Are relatively immune to group pressures.
  4. Have a heightened sense of insecurity.

Question type: factual

Section 8.4 Context and Applications

37. The price tag for U.S. counterterrorism activities lies between

  1. $3 and $5 trillion.
  2. $200 and $300 million.
  3. $55 and $63 billion.
  4. $150 and $152 trillion.

Question type: factual

Section 8.4 Context and Applications

38. The Muslim Brotherhood won power elections in this country, but was later overthrown by the military:

  1. Algeria.
  2. Egypt.
  3. Syria.
  4. Iraq.

Question type: factual

Section 8.4 Context and Applications

39. Which of the following groups fought in Italy in the 1970s?

  1. Red Brigades.
  2. Red Army Faction.
  3. ETA.
  4. IRA.

Question type: conceptual

Section 8.4 Context and Applications

40. Guerrilla warfare is BEST described as

  1. Political violence by identifiable, irregular combat units, usually to seize state power, win autonomy, or found new states.
  2. Random acts of violence by specific, radical fighter groups to overthrow multinational corporations.
  3. Freedom fighters that combat in the name of Allah mostly in Latin America and Asia.
  4. Separatist groups that fight for more political rights generally against other power-striving paramilitary combat units.

Question type: conceptual

Section 8.4 Context and Applications

41. Which of the following statements about terrorism and the international system is TRUE?

  1. The international system is now quite resilient, so terrorists cannot trigger a global war.
  2. There is currently no concert of great powers to counteract terrorist activities.
  3. Many states are now safe havens for terrorists and will remain so.
  4. Violent ideologies outside of militant Islamic fundamentalism are an increasing threat to states and the international system.

Question type: factual

Section 8.4 Context and Applications

42. Which wave of terrorism occurred first?

  1. Anarchism.
  2. Anticolonialism.
  3. Radical Communism.
  4. Religious.

Question type: factual

Section 8.4 Context and Applications

43. Which wave of terrorism occurred second?

  1. Anarchism.
  2. Anticolonialism.
  3. Radical Communism.
  4. Religious.

Question type: factual

Section 8.4 Context and Applications

44. Which of the following is NOT a feature of the new terrorism wave?

  1. Terrorists have increasingly resorted to attacks on civilian populations to achieve greater carnage and more headlines.
  2. Terrorism’s operations have become global.
  3. Terror cells have one central point of command.
  4. Terrorists more often operate in small, loosely connected groups.

Question type: factual

Section 8.4 Context and Applications

45. ______is the glorification of personal destruction in the name of a particular goal.

  1. Martyrdom.
  2. Suicide bombing.
  3. Running amok.
  4. Metamorphosis.

Question type: factual

Section 8.4 Context and Applications

46. Osama bin Laden was born into a wealthy family from

  1. Jordan.
  2. Egypt.
  3. Saudi Arabia.
  4. Tunisia.

Question type: factual

Section 8.4 Context and Applications

47. As an adolescent, Osama bin Laden _____ strong fundamentalist views of Islam.

  1. Accepted.
  2. Refused.
  3. Questioned.
  4. Was indifferent to.

Question type: applied

Section 8.4 Context and Applications

48. An Afghani suicide bomber attacking a U.S. target engages in

  1. Sharia.
  2. Jihad.
  3. Counterterrorism.
  4. Guerrilla warfare.

Question type: applied

Section 8.4 Context and Applications

49. The Soviet invasion of Afghanistan in 1979 brought ______ to the battlefield to fight for Islam.

  1. Bin Laden.
  2. Rambo.
  3. Qaddafi.
  4. Che Guevara.

Question type: applied

Section 8.4 Context and Applications

50. Bin Laden referred to Great Satan, indicating

  1. The Soviet Union.
  2. The United States.
  3. Afghanistan.
  4. Pakistan.

Question type: factual

Section 8.4 Context and Applications

51. For al-Qaeda, the two main enemies are

  1. Iran and Afghanistan.
  2. Christianity and the United States.
  3. Europe and international banking.
  4. Western civilization and Israel.

Short-Answer Questions

1. Define terrorism.

2. What does the term counterterrorism stand for?

3. Name and explain three forms of terrorism.

4. What is cyberterrorism and why is it a security threat?

5. Describe and define the logic of terrorism.

6. Name and explain some ideological foundations of terrorism.

7. What is cyberterrorism?

8. List key tools of cyberwarfare.

9. What does RAF stand for and what were its goals?

10. What is al-Qaeda?

11. Explain the term Sharia law.

12. What do we understand by asymmetrical threats?

13. What are the three pillars of terrorism according to constructivists?

14. What is the new terrorism?

15. Who was Osama bin Laden and why was he important for international relations?

16. What is the Muslim Brotherhood?

17. Define and explain the term jihad.

18. What happened at the Olympic Games in Munich in 1972?

19. Explain the term Red Brigades.

20. What is political Islam?

21. What are preemptive strategies?

22. Define the term homeland security.

23. What is a caliphate and why is the term important today?

24. What are the key characteristics of guerrilla warfare?

25. What are preemptive policies?

Essay Questions

1. Discuss the pros and cons of government strategies to define and label terrorist groups in society.

2. Identify and analyze a constructivist approach to combating international terrorism.

3. Have realist approaches to fight international terrorism been successful? Discuss.

4. Has the nature of terrorism changed over time? Draw on specific examples to support your claims.

5. Using an empirical example of your choice, discuss the concept of asymmetrical threats.

6. Analyze the liberalist view of terrorism and discuss the value of its counterterrorism strategies.

7. Compare and contrast realist, liberalist, and constructivist approaches to counterterrorism.

8. Use the state policies context to discuss why different types of states are more vulnerable to terrorism and how different types of states respond to terrorism.

9. Write an essay about Osama bin Laden, including discussion and analysis of what set him on the path to terrorism.

10. Explain and discuss the global waves of terrorism over time, using specific empirical examples of your choice.

11. Write an essay on cyberterrorism. What are the main tools that cyberterrorists can use, and what would they try to achieve?

12. How do the realist and liberal perspectives differ on the regulation and potential use of artificial intelligence warfare?

Document Information

Document Type:
DOCX
Chapter Number:
8
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 8 Terrorism And Evolving Security Challenges
Author:
Eric Shiraev

Connected Book

Exam Pack | International Relations 3e Shiraev

By Eric Shiraev

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party